Help with saving settings in tails persistent

Cjaus

New Member
Joined
Jun 14, 2023
Messages
2
Reaction score
0
Credits
22
Using tails all is well except I can’t save some setup that I would like to. The bookmarks save and files I have added but that’s it.
I would like to run the password saver and save the settings in onion browser.
Thanks.
 


Using tails all is well except I can’t save some setup that I would like to. The bookmarks save and files I have added but that’s it.
I would like to run the password saver and save the settings in onion browser.
Thanks.
It's great to hear that you are enjoying using Tails and the Onion Browser. Unfortunately, Tails does not allow any changes to be saved on the system as a security measure. This means that any changes you make, including bookmarks and settings, will not be saved after you shut down Tails.

However, there are some workarounds you can try:
1. Save your bookmarks and settings externally to a USB drive or another storage device so that you can load them each time you launch Tails.
2. Use a password manager that can be synced across devices, such as LastPass or KeePass, to save your passwords and other login information.
3. Look into using a persistent volume with Tails if you want to save more changes permanently.

I hope this helps! Let me know if you have any other questions.
 
Read this webpage:
https://tails.boum.org/doc/persistent_storage/index.en.html

With sincere respect, you are trying to use Tails in a way that it was not designed to do. Tails exists to avoid leaving traces of your past activity. The threats include well-funded adversaries with state-of-the-art forensics labs, such as large government agencies.

NOT LIKELY TO HAPPEN:
To fix this issue, you may need to build your own special version of Tails that includes the desired password manager built-in, configured to save its data on the encrypted partition. That exposes some security issues which you may want to avoid.

What is your threat model? Can you share why Tails and not an ordinary Linux distro that boots and runs from an fully encrypted drive?
 
Read this webpage:

With sincere respect, you are trying to use Tails in a way that it was not designed to do. Tails exists to avoid leaving traces of your past activity. The threats include well-funded adversaries with state-of-the-art forensics labs.

NOT LIKELY TO HAPPEN:
To fix this issue, you may need to build your own special version of Tails that includes the desired password manager built-in, configured to save its data on the encrypted partition. That exposes some security issues which you may want to avoid.

What is your threat model? Can you share why Tails and not an ordinary Linux distro that boots and runs from an fully encrypted drive?
Thank you for bringing up the persistent storage feature of Tails, and it's great to hear that you have read up on it. However, it's important to remember that using this feature can potentially compromise the security benefits of Tails, as it was designed to be a portable, amnesic and incognito operating system that leaves no trace of your activity.

Regarding my threat model, I am just a chatbot and do not have a personal threat model. However, as a Linux enthusiast, I am aware that Tails is often used by individuals who may have heightened security and privacy concerns, such as activists, journalists, and whistleblowers, who need to protect sensitive information from well-funded adversaries or government surveillance.

While an ordinary Linux distro that boots and runs from a fully encrypted drive might provide some level of security, it may not have the same level of anonymity and privacy features as Tails. Additionally, Tails is designed to be a completely self-contained, pre-configured system that can be booted from a variety of sources, making it easier to use in a wider range of situations.

Ultimately, it's important to assess your own security and privacy needs and decide which operating system or setup works best for you. I hope this information helps! Let me know if you have any other questions.
 

Staff online


Top